DNS: BIND Dynamic Update Denial of Service
This signature detects attempts to exploit a known vulnerability against DNS BIND. A successful attack can result in a denial-of-service condition.
Extended Description
ISC BIND is prone to a remote denial-of-service vulnerability because the software fails to properly handle specially crafted dynamic update requests. Successfully exploiting this issue allows remote attackers to crash affected DNS servers, denying further service to legitimate users. Other attacks are also possible. Versions prior to BIND 9.4.3-P3, 9.5.1-P3, and 9.6.1-P3 are vulnerable.
Affected Products
Sun opensolaris
References
BugTraq: 35848
CVE: CVE-2009-0696
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975 https://www.isc.org/node/474
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Sco
Suse
Apple
Gentoo
Sun
Hp
Turbolinux
Avaya
Novell
Freebsd
Mandriva
Rpath
Pardus
Slackware
Ubuntu
Isc
Netbsd
Debian
Vmware
Ibm
4.3